YoVDO

Introduction to GLIBC Heap Exploitation

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Exploit Development Courses

Course Description

Overview

Dive into the world of GLIBC heap exploitation in this comprehensive 90-minute conference talk presented at 44CON Information Security Conference. Explore the intricacies of heap memory management, common vulnerabilities, and advanced exploitation techniques. Learn how to identify and exploit heap-based vulnerabilities, understand the inner workings of the GLIBC allocator, and gain practical insights into crafting sophisticated heap exploits. Discover essential tools and methodologies used by security professionals to analyze and manipulate heap structures. Whether you're a beginner or an experienced security researcher, gain valuable knowledge to enhance your understanding of memory corruption vulnerabilities and improve your ability to secure systems against heap-based attacks.

Syllabus

Introduction To GLIBC Heap Exploitation - Max Kamper


Taught by

44CON Information Security Conference

Related Courses

CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent
Reverse Engineering and Exploit Development
Udemy
Penetration Testing: Advanced Kali Linux
LinkedIn Learning
Linux x86 Assembly and Shellcoding
Udemy
Python : Sıfırdan İleri Seviyeye - Etik Hacker Örnekleriyle
Udemy